skip to main content
article
Free Access

Exploring the privacy implications of addressable advertising and viewer profiling

Published:01 May 2006Publication History
Skip Abstract Section

Abstract

Collecting consumer viewing habits will come back to bite advertisers who do not understand or appreciate how consumers feel about privacy infringement.

References

  1. Abreu, E. Is TiVo snooping on couch potatoes? PC World, 2001.Google ScholarGoogle Scholar
  2. Bass, A. You are what you watch. CIO Magazine, 2004.Google ScholarGoogle Scholar
  3. Charney, B. TiVo watchers uneasy after post-Super Bowl reports. CNET News, 2004.Google ScholarGoogle Scholar
  4. Chesak, J. and Dippold, J. Frequent Doesn't Mean Loyal: Using Segmentation Marketing to Build Shopper Loyalty. AC Nielsen, 2004.Google ScholarGoogle Scholar
  5. Cohen, D. Addressable TV: Myths and realities. ClickZ Marketing, 2004.Google ScholarGoogle Scholar
  6. Nielsen Media Research. TiVo and Nielsen Media Research agree to market DVR usage information. Press release, 2004.Google ScholarGoogle Scholar
  7. Overby, C. Forrester: Consumers want value. RFID Journal, 2004.Google ScholarGoogle Scholar
  8. Ryker, R., Lafleur, E., Cox, C., and McManis, B. Online privacy policies: An assessment of the fortune e-50. J. Computer Information Systems 42, 4 (2002), 15--20.Google ScholarGoogle Scholar
  9. Spangler, W.E., Gal-Or, M., and May, J.H. Using data mining to profile television viewers in the digital TV era. Comm ACM 46, 4 (Apr. 2003), 66--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Stafford, T.F. and Urbaczewski, A., Spyware: The ghost in the machine. Commun AIS 14 (2004), 291--306.Google ScholarGoogle Scholar
  11. TiVo. TiVo Privacy Policy, 2004.Google ScholarGoogle Scholar
  12. Zaslow, J. If TiVo thinks you are gay, here's how to set it straight. WSJ, (Nov. 26, 2002).Google ScholarGoogle Scholar

Index Terms

  1. Exploring the privacy implications of addressable advertising and viewer profiling

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 49, Issue 5
              Two decades of the language-action perspective
              May 2006
              125 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1125944
              Issue’s Table of Contents

              Copyright © 2006 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 May 2006

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format